APPENDIX C ADDITIONAL THEORETICAL RESULTS

Size: px
Start display at page:

Download "APPENDIX C ADDITIONAL THEORETICAL RESULTS"

Transcription

1 PPENDIX MORE DISCUSSION ON THE TOMIC VM SIZING SSUMPTION Readers may be concerned that different jobs will have varying resource requirements that cannot be accommodated by the simple atomic size assumption. For example, hadoop and data analytics jobs have stringent requirement on CPU and bisection bandwidth, while database applications require more I/O and memory. We notice that in reality, public clouds have some special VM configurations that do not follow the atomic sizing assumption for these jobs. For example mazon EC provides high-memory, high-cpu, high I/O, and cluster compute instances specialized for certain applications. It is highly likely that they are managed separately with a different infrastructure. Measurement results [] corroborate our arguments while public information is yet to be made available on the specifics of the mazon infrastructure. We thus take the liberty to adopt this assumption, and believe that this represents a close resemblance of reality while keeping the problem analytically tractable. PPENDIX B DDITIONL EXMPLES FOR SEC. ND B. n example where the classical D algorithm may fail for job-machine stable matching Fig. shows an example similar to Fig.. Say we first let jobs a, b, c propose until they cannot. The result is (c),b (b), and a is rejected by. t this point, only d can propose to, and holds the offer. The final result is (c, d),b (b). This is clearly type- blocked by (b, ), as prefers b to d and b prefers to B. p(j) j s(j) c(m) m p(m), B B, a b c d B c, a, b, d b, c Fig.. n example where a possible execution of the D algorithm produces a type- blocking pair (b, ). On the other hand, if we let d propose to first before a and b, and keep the rest of the execution sequence unchanged, the result becomes (c),b (b), which is weakly stable. This example demonstrates two problems when applying the classical D algorithm here. First, the execution sequence is no longer immaterial to the. Without the atomic sizing or any other assumption to reduce the dimensionality of resources, the problem is essentially a multiple knapsack problem which is known to be NP-hard []. Multi-resource allocation is an open problem for which there has been some progress made recently in understanding the problem []. outcome. Second, it may yield an unstable matching. This creates considerable difficulties since we cannot determine which proposing sequence yields a weakly stable matching for an arbitrary problem. B. n example where running Revised D multiple times may result in an unstable matching To give an example, let us take a look at the problem in Fig.. We now run Revised D over this example. The result will then be (d),b (e),c (a). Clearly there are two type- blocking pairs, (a, ) and (b, C). Say we fix this by letting a propose to and b propose to C. Then we have a new type- blocking pair (c, C) due to the removal of job a from C, where c prefers C to being unassigned, and C prefers c to b and by rejecting b it has enough capacity to admit c. This is a result of C wrongly accepting b when it actually has more capacity after a leaves. p(j) j s(j) c(m) m p(m), B, C B, B a b c d e B C d, c, b, a e, d, c, b, a a, c, b Fig.. n example where simply running the revised D algorithm multiple times will produce a new type- blocking pair (c, C). PPENDIX C DDITIONL THEORETICL RESULTS C. Proof of Lemma Proof: This is a direct result of the algorithm design, since in t + every proposing job proposes to machines that have previously rejected it. If any of these machines accepted it, µ t+ (j) j µ t (j). If none of these machines accepted it, it will for sure be able to propose to its previous machine µ t (j) since c pre t+ (µ t(j)) must be no smaller than s(j). µ t (j) will for sure accept j at t +, because it will only receive offers from jobs that it previously rejected, possibly also from other jobs that it previously accepted if they propose to other machines and are rejected in t +. j remains favorable to m, even when all of m s accepted jobs in t proposed to m in t + again. C. Proof of Theorem 7 To prove Theorem 7 we need the following lemmas.

2 Lemma C.: If a particular job j participates in stage t +, it must have participated in stage t. Proof: It is a direct result of our algorithm design. When a job stops participating in t +, it does not form any blocking pair with any of the machines no matter how the rest of jobs participated in t are matched. Lemma C.: If a set of jobs do not participate in a particular stage t in Multi-stage D, then they are assigned to their best possible machine in all weakly stable matchings after t. Proof: Let us call a machine possible for a given job if there is a weakly stable matching that assigns it there. We can prove this lemma by induction. It is clear that when we pick up all the jobs that can participate, it is equivalent to pick up those that definitely cannot participate. We can easily do so by first finding jobs that cannot participate unless some jobs that did not participate in the previous stage participate, marking them, and finding the rest that cannot participate unless some jobs that were marked in this stage or previous stages participate, until there is no such job. ssume that up to a certain point of Multi-stage D, the lemma holds, i.e. no marked job was permanently rejected by a possible machine (since it cannot propose any more). Now suppose we mark job j, which is (permanently) rejected by a possible machine m in a hypothetical matching µ. Since j is marked, m must have accepted a set of jobs J m that are preferable than j and marked before. Then, in µ, at least one of the jobs from J m must be sent to a less desirable machine, since all machines preferable than m is impossible for it by assumption. This clearly forms a type- blocking pair in µ, and contradicts with the assumption. Thus the proof. This shows that our algorithm only permanently rejects jobs from machines that are impossible to accept them in all weakly stable matchings, when the jobs cannot participate any further. The resulting assignment is therefore optimal. Lemma C.: If µ t = µ t in Multi-stage D, then the set of participating jobs at t are assigned their best possible machine in all weakly stable matchings. Proof: ssume that at a given point of the algorithm execution at t, every job matched to its previous machine µ t (j) is given its best possible machine. Suppose now, j is rejected by all machines better than µ t (m), while there is a hypothetical weakly stable matching µ that sends j to a better machine m. Thus j must have proposed to and been rejected by m. m rejected j because it accepted j,j,, each of which is preferable than j. If j i did not participate in t, by Lemma C. m is its best possible machine. If j i participated in t, by assumption m is impossible for it. Thus in µ, for m to have j, at least one of j i has to be sent to a less desirable machine, which causes a type- blocking pair (j i,m) in µ, which contradicts the assumption. Now we can prove Theorem 7. Proof of Theorem 7: There are two possible cases when Multi-stage D terminates. If the algorithm terminates when there is no type- blocking pair, i.e. no job can, or wishes to if it can, participate by proposing to a better machine. Then by Lemma C., all these jobs are assigned to their best possible machine. Therefore the resulting matching is job-optimal. If the algorithm terminates at stage t where µ t = µ t, then by Lemma C. all jobs that did not participate in t are assigned the best machine. By Lemma C. all jobs that participated in t are also sent to their best machine. Hence the matching is also the job-optimal weakly stable matching. C. Proof of Theorem 8 Proof: This can be easily proved by contradiction. ssume that the matching produced when the algorithm terminates with no job proposing is not strongly stable. Thus, we must be able to find a type- blocking pair, say (j, m), as implied by Theorem. m will participate in the next stage, and j will be willing to propose to m, and our algorithm will continue to run, rather than terminating. This contradicts with our assumption. We conjecture that when the algorithm terminates with type- blocking pairs, the problem does not admit a strongly stable solution. The proof is, however, not immediate and left for future work. PPENDIX D N ONLINELGORITHM D. lgorithm design In this section, we address the technical challenge of devising an online algorithm. We extend the static problem setting to a dynamic environment, where the set of jobs J arrive online instead of offline. We observe that our Revised D algorithm can be readily used in the online setting. The high-level idea is that, we fix the previous matching and improve upon it by applying Revised D only on the set of new jobs. The reason to fix the previous matching is to avoid the potential overhead of and downtime caused by VM migration that may occur if we allow the previous jobs to participate with the new jobs. Since most resource management policies for clients, as we shown in Sec.., depend on system state variables that change during the placement process, the preferences of new VMs need to be configured according to the most updated state variables. Let us now present the details of the online version of Revised D called as shown in Table. First of all, the execution never stops. fter a matching is found, it waits for new requests. When a new set of jobs J arrive, their preferences are configured according to the current system state variables. The server preferences. Presumably, the set of machines is fixed for a long period of time.

3 are configured with regards to the new jobs only. Then the Revised D algorithm runs with the new jobs J and all the servers M. Note that in step 7 c(m) is the current server capacity, since it is always updated during the running of Revised D. TBLE : Input: c(m), 8m M : Initialize all m Mto free : while true do : Wait until new jobs J arrive : Configure preferences of new jobs j J p(j) according to the current system state. : Configure preferences of all servers p(m) with regards to new jobs J. 7: Run Revised D with c(m),p(m), 8m M, s(j),p(j), 8j J. 8: Output the current matching 9: end while D. Discussions Readers may wonder if our Multi-stage D algorithm also can be revised to be an online algorithm. We choose not to use Multi-stage D because it is iterative and takes much longer to converge when the problem scale is large, which may not be acceptable in practice. This is experimentally demonstrated in Sec... Thus Multi-stage D is only to be used as an offline algorithm for small to medium scale static problems, while the simple Revised D and can be used in offline and online fashion, for even large-scale problems. We thus consider Revised D and Online D more suited for practical use of large-scale dynamic cloud systems, while Multi-stage D more of theoretical value in exploring the intricacy of the job-machine matching problem with size heterogeneity. PPENDIX E DDITIONL POLICY EXMPLES The versatility of the preference concept can be further shown in the following examples. Colocation/anti-colocation. In practice, some clients do or do not want their VMs to be placed with VMs of some other tenants. nchor supports this policy using the PI call colocate(tenants, i, g_c), where tenants is a list of tenants, i is a boolean variable to indicate whether the caller wishes to colocate or anticolocate itself with clients in tenants, and g_c is an optional argument indicating the common policy group the colocating tenants belong to. In case a client wishes to colocate with a set of clients B, it makes a call to colocate(b, true, g). Since colocation is a mutual agreement, client and clients in B must share a common policy group g which is assumed to be agreed upon beforehand. The provider then bundles client s VM with VMs of clients in B as virtual VMs, where each virtual VM consists of an individual VM of and an individual VM of each client in B. Such a virtual VM is then treated as a single VM to join the policy group g and participate in nchor s stable matching algorithms. In case a client wishes to anti-colocate with a set of clients B, it can indicate so with colocate(b, false). The provider partitions the entire set of servers into two non-overlapping sets X and Y. It creates for a new policy group g_ containing servers in X only, and for each client in B a new policy group g_b containing servers in Y only. Client and clients in B can then configure their own policy groups for their preferences. It is guaranteed that client and clients in B propose to nonoverlapping sets of servers and will not be colocated. Note that anti-colocation is not a mutual agreement, and thus clients involved can have distinct preferences and policy groups. Tiered service. It is a common practice to implement tiered services in an operational cloud, by associating each VM with a priority class. This can be done in nchor with a call to conf(g_o, priority). Incomplete preferences. It is possible that some VMs can only be placed on a subset of servers, due to hardware constraints for instance. Such placement limitations can be accommodated in nchor, as the list of preference does not need to contain the entire set of servers. The policy engine in nchor supports an additional PI call limit(g_c, servers) so that VM preferences in a client policy group g_c only include servers specified in servers. Combination of policies. Besides individual policies, nchor also supports combinations of policies, which is also common in practice. The PI call conf(g, factor, factor,...) is designed for this purpose, where different policies are input following a decreasing priority order. multi-pass sorting procedure is then performed, first based on the least important factor, then the second least, and so on, to produce preferences that adhere to this combination of policies. E. Discussion Most preference examples shown above for clients are based on state variables that change during the placement process. However, we emphasize that the preferences do not change during the placement process, for otherwise the concept of stability cannot be well defined with respect to the constantly changing preferences. Our algorithms thus produce a stable matching with respect to the preferences and system state given before the placement process. This results in sub-optimal client performance compared to other algorithms that keep track of state variables during the process. This is an inherent limitation of the stable matching framework when applied to cloud resource management, because many practical policies rely critically on system state variables. We believe that it is an important and difficult

4 problem, and would like to study it further as our future work. PPENDIX F DDITIONL EVLUTION RESULTS F. Implementation details The resource monitor is implemented as a Python application that maintains resource statistics of servers and VMs using SQLite, a lightweight database engine. The sqlite Python bundle is utilized to update records in the database. The resource monitor periodically listens for usage reports once per second from a daemon in each server, which we have implemented for the sole purpose of collecting measurements of CPU and memory usage, via the VirtualBox management PI (VBoxManage metrics). Our daemon utilizes the iptraf tool to detect the available bandwidth of each server, since VirtualBox does not provide suitable PIs for this purpose. The policy manager also utilizes SQLite to manage policy groups for both the operator and cloud clients, and updates its databases upon receiving an nchor PI call. For efficiency, it maintains all the preferences in memory. When a placement request arrives, it obtains necessary information from the resources monitor s database, and sends sorted preferences to the matching engine. The matching engine implements the Revised D and Multi-stage D in the offline case, as well as the in the online case in Python. We preprocess server preferences (with a complexity of O(n)) to obtain an inverse of the list indexed by VM ID. Each subsequent rank comparison can thus be performed in constant time. For maximum efficiency, we use numpy in Python to implement the data structure of preferences. F. Small-scale experimental evaluation of nchor s effectiveness This experiment uses both consolidation and load balancing policies for VM placement to demonstrate the effectiveness of nchor in realizing resource management policies. We assume that clients follow the operator s default policy in the experiment here, so there is no conflicting interest involved. Occupancy existing VMs new VMs Server Fig.. Consolidation. Occupancy 7 existing VMs new VMs Server Fig.. Load Balancing. The experiment is to allocate VMs to servers, the first four of which are configured with an occupancy of,,,, respectively. Fig. shows the result of using the consolidation policy, where VM preference is ranked in descending order of server occupancy, and server preference is ranked in descending order of VM size. We observe that all the VMs are packed into the first five servers, whose occupancy is thus maximized. On the other hand, the load balancing policy distributes VMs across the idle servers, resulting in a more balanced server load as shown in Fig.. Multi-stage D takes iterations to converge to the strongly stable matching of Fig. for the former case, and iterations for the latter. F. Evaluation results on We conduct large-scale trace-driven simulations to evaluate nchor in a dynamic environment where VM placement requests arrive dynamically. We again use the RICC workload trace as the input to our algorithm. The trace contains each task s arrival time, finish time, and amount of resources requested. In our simulation, we process each task scheduling request in the trace according to its arrival time as VM placement request(s) of various sizes, and use to determine a matching for them. When the task finishes, we remove its VMs from the corresponding servers, so capacity is freed to accommodate future requests. In our simulations, the servers are configured to use the consolidation policy. The VMs are again randomly chosen to join the default, the CPU-bound, and the memory-bound policy group that uses the consolidation policy, the CPU bound and the memory-bound resource hunting policy, respectively. The free CPU and memory of a server is simply calculated as the total CPU and memory minus the amount allocated to its active VMs. We emphasize that VM preferences in this case are configured upon arrival using the most current system state variables as discussed above. Large tasks that require more than one server is translated into multiple smaller requests. We simulate the exact birth-death history of the first tasks in the RICC trace, amounting to VM placement requests that cover a time period of 79 seconds, or roughly. days. We compare with the online version of the first fit algorithm that first sorts the VMs according to their size (recall servers use a consolidation policy), and then tries to place a VM to the best machine according to its preference that has sufficient capacity to take it upon its arrival. The number of servers is fixed at. VM Happiness (%) Online first fit 8 8 VM request arrival () Fig.. VM happiness in a dynamic setting. Server Happiness (%) 8 Online first fit 8 VM request arrival () Fig.. Server happiness in a dynamic setting.

5 The results are shown in Fig. and. We can see that in terms of VM happiness, only slightly outperforms Online first fit by about 7%. However in terms of server happiness, enjoys a significant improvement where servers obtain their top % of the VMs while Online first fit is only able to match servers with their top % VMs. The reason of the performance discrepancy is again due to the elegant propose-reject design of stable matching algorithms. s discussed in Sec.., the first fit algorithm will not match a VM to a server whose capacity is insufficient, while will if this VM is preferable than some of the server s VMs during its execution. This improves the happiness of both VMs and servers, since VMs can get better machines even when they are occupied, and servers can also get their favorable VMs. We also evaluate the complexity of. Fig. 7 shows the running time of, including processing preferences, for the entire course of simulation. Observe that it takes less than seconds in any case to find a matching for new VMs, making it responsive to dynamic situations. Fig. 8 further shows that the algorithm usually terminates in less than iterations. Time (s) 8 VM request arrival () Fig. 7. Running times of. Iterations 8 VM request arrival () Fig. 8. Number of iterations of. Result: The algorithm is responsive and efficient to handle dynamic VM placement requests. Its performance is significantly better than existing methods based on the first fit algorithm. F. Deployment in Real Cloud Environment Here we discuss some potential challenges related to the real-world deployment of nchor in a cloud environment. The virtualized cloud infrastructure does not need any change to deploy nchor. ll the major virtualization solutions, including VMware, Xen, KVM, etc., collect resource utilization statistics through the hypervisor and provide PI to access the information. nchor can directly utilize the hypervisor PIs for its resource monitor. The cloud s client PI needs to be augmented to include nchor s policy interface as shown in Table of the main file for clients and the operator to express their policy goals. Given that the cloud operator has total control over its own client PI and interface, this is not difficult to implement in reality. In terms of scalability, nchor s Revised D and Online D algorithms are demonstrated to be efficient in handling large-scale VM placement problems, while Multistage D may only be suitable for small-scale problems in Sec.. For large-scale problems, the possible limitation is from the network interconnect, which may become the bottleneck for transmitting the bulky OS image files for initializing VMs. This has started to gain attention in some recent work []. PPENDIX G RELTED WORK ON JOB SCHEDULING There have been tremendous efforts on job scheduling in a computer cluster or grid. [], [] represent several early works that focus on minimizing the expected completion time of all jobs by strategically choosing their execution sequence. [7], [8] discuss the online algorithm design problem for grid computing. The focus is on the completion times of jobs, which in our case are not known a prior to the scheduler of a cloud since users may use VMs for as long as they wish. For more complete coverage of the literature readers are directed to [9], []. [] present some recent efforts of developing scheduling algorithms taking into account the practical constraints of a grid, including the trade-off between cost and time in a grid resource market, the QoS, etc., while [] analyzes the performance of datacenters using queueing theory. The distinction between this line of work and ours is clear: in cloud computing with VMs, the major difficulty of job scheduling comes from the inability to unify the different factors that operators and clients may consider as a single utility function, and from the packing constraint represented by the size heterogeneity of jobs. Our use of stable matching theory resolves the problem by adopting the stability concept, and new algorithms are developed to specifically tackle the size heterogeneity of jobs. REFERENCES [] G. Wang and T. Ng, The impact of virtualization on network performance of mazon EC data center, in Proc. IEEE INFOCOM,. [] M. Korupolu,. Singh, and B. Bamba, Coupled placement in modern data centers, in Proc. IPTPS, 9. [] C. Joe-Wang, S. Sen, T. Lan, and M. Chiang, Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework, in Proc. IEEE INFOCOM,. [] C. Peng, M. Kim, Z. Zhang, and H. Lei, VDN: Virtual machine image distribution network for cloud data centers, in Proc. IEEE INFOCOM,. [] O. H. Ibarra and C. E. Kim, Heuristic algorithms for scheduling independent tasks on nonidentical processors, J. CM, vol., no., pp. 8 89, pril 977. [] S. K. Sahni, lgorithms for scheduling independent tasks, J. CM, vol., no., pp. 7, January 97. [7] W. Leinberger, G. Karypis, and V. Kumar, Job scheduling in the presence of multiple resource requirements, in Proc. CM/IEEE Conference on Supercomputing, 999. [8] S. Muthukrishnan, R. Rajaraman,. Shaheen, and J. Gehrke, Online scheduling to minimize average stretch, in Proc. IEEE FOCS, 999.

6 [9] V. K. Naik, M. S. Squillante, and S. K. Setia, Performance analysis of job scheduling policies in parallel supercomputing environments, in Proc. CM/IEEE Conference on Supercomputing, 99. [] T. D. Braun, H. J. Siegel, N. Beck, L. L. Bölöni, M. Maheswaran,. I. Reuther, J. P. Robertson, M. D. Theys, B. Yao, D. Hensgen, and R. F. Freund, comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems, Elsevier Journal of Parallel and Distributed Computing, vol., no., pp. 8 87, June. [] M.. Salehi, B. Javadi, and R. Buyya, QoS and preemption aware scheduling in federated and virtualized grid computing environments, Journal of Parallel and Distributed Computing (JPDC), vol. 7, no., pp.,. [] H. Khazaei, J. Mi sić, and V. Mi sić, Performance analysis of cloud computing centers using M/G/m/m + r queueing systems, IEEE Trans. Parallel Distrib. Syst., vol.,, to appear.

A Novel Task Scheduling Algorithm for Heterogeneous Computing

A Novel Task Scheduling Algorithm for Heterogeneous Computing A Novel Task Scheduling Algorithm for Heterogeneous Computing Vinay Kumar C. P.Katti P. C. Saxena SC&SS SC&SS SC&SS Jawaharlal Nehru University Jawaharlal Nehru University Jawaharlal Nehru University New

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

HETEROGENEOUS COMPUTING

HETEROGENEOUS COMPUTING HETEROGENEOUS COMPUTING Shoukat Ali, Tracy D. Braun, Howard Jay Siegel, and Anthony A. Maciejewski School of Electrical and Computer Engineering, Purdue University Heterogeneous computing is a set of techniques

More information

Mapping Heuristics in Heterogeneous Computing

Mapping Heuristics in Heterogeneous Computing Mapping Heuristics in Heterogeneous Computing Alexandru Samachisa Dmitriy Bekker Multiple Processor Systems (EECC756) May 18, 2006 Dr. Shaaban Overview Introduction Mapping overview Homogenous computing

More information

A CSP Search Algorithm with Reduced Branching Factor

A CSP Search Algorithm with Reduced Branching Factor A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il

More information

Consolidating Complementary VMs with Spatial/Temporalawareness

Consolidating Complementary VMs with Spatial/Temporalawareness Consolidating Complementary VMs with Spatial/Temporalawareness in Cloud Datacenters Liuhua Chen and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Introduction

More information

Virtual Machine Placement in Cloud Computing

Virtual Machine Placement in Cloud Computing Indian Journal of Science and Technology, Vol 9(29), DOI: 10.17485/ijst/2016/v9i29/79768, August 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Virtual Machine Placement in Cloud Computing Arunkumar

More information

Load Balancing Algorithm over a Distributed Cloud Network

Load Balancing Algorithm over a Distributed Cloud Network Load Balancing Algorithm over a Distributed Cloud Network Priyank Singhal Student, Computer Department Sumiran Shah Student, Computer Department Pranit Kalantri Student, Electronics Department Abstract

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4 RESEARCH ARTICLE International Journal of Computer Techniques - Volume 3 Issue 1, Jan- Feb 2015 Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

PERFORMANCE CONSTRAINT AND POWER-AWARE ALLOCATION FOR USER REQUESTS IN VIRTUAL COMPUTING LAB

PERFORMANCE CONSTRAINT AND POWER-AWARE ALLOCATION FOR USER REQUESTS IN VIRTUAL COMPUTING LAB PERFORMANCE CONSTRAINT AND POWER-AWARE ALLOCATION FOR USER REQUESTS IN VIRTUAL COMPUTING LAB Nguyen Quang Hung, Nam Thoai, Nguyen Thanh Son Ho Chi Minh City University of Technology, Vietnam Corresponding

More information

An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers

An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 8 Issue 01 Ver. II Jan 2019 PP 38-45 An Optimized Virtual Machine Migration Algorithm

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS(TPDS), VOL. N, NO. N, MONTH YEAR 1 Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Zhen Xiao,

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,

More information

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Table of Contents Introduction... 3 Topology Awareness in Hadoop... 3 Virtual Hadoop... 4 HVE Solution... 5 Architecture...

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,

More information

Ranking Clustered Data with Pairwise Comparisons

Ranking Clustered Data with Pairwise Comparisons Ranking Clustered Data with Pairwise Comparisons Alisa Maas ajmaas@cs.wisc.edu 1. INTRODUCTION 1.1 Background Machine learning often relies heavily on being able to rank the relative fitness of instances

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Figure 1: Virtualization

Figure 1: Virtualization Volume 6, Issue 9, September 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Profitable

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

A Mathematical Computational Design of Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks

A Mathematical Computational Design of Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks A Mathematical Computational Design of Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks Dr.M.Upendra Kumar #1, Dr.A.V.Krishna Prasad *2, Dr.D.Shravani #3

More information

Extremal Graph Theory: Turán s Theorem

Extremal Graph Theory: Turán s Theorem Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-9-07 Extremal Graph Theory: Turán s Theorem Vincent Vascimini

More information

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple

More information

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1. 134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

6 Distributed data management I Hashing

6 Distributed data management I Hashing 6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Improving CPU Performance of Xen Hypervisor in Virtualized Environment

Improving CPU Performance of Xen Hypervisor in Virtualized Environment ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 5 Issue 3; May-June 2018; Page No. 14-19 Improving CPU Performance of

More information

Scalability of Heterogeneous Computing

Scalability of Heterogeneous Computing Scalability of Heterogeneous Computing Xian-He Sun, Yong Chen, Ming u Department of Computer Science Illinois Institute of Technology {sun, chenyon1, wuming}@iit.edu Abstract Scalability is a key factor

More information

ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES*

ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES* ON WEIGHTED RECTANGLE PACKING WITH LARGE RESOURCES* Aleksei V. Fishkin, 1 Olga Gerber, 1 Klaus Jansen 1 1 University of Kiel Olshausenstr. 40, 24118 Kiel, Germany {avf,oge,kj}@informatik.uni-kiel.de Abstract

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

Black-box and Gray-box Strategies for Virtual Machine Migration

Black-box and Gray-box Strategies for Virtual Machine Migration Full Review On the paper Black-box and Gray-box Strategies for Virtual Machine Migration (Time required: 7 hours) By Nikhil Ramteke Sr. No. - 07125 1. Introduction Migration is transparent to application

More information

Dynamic Resource Allocation on Virtual Machines

Dynamic Resource Allocation on Virtual Machines Dynamic Resource Allocation on Virtual Machines Naveena Anumala VIT University, Chennai 600048 anumala.naveena2015@vit.ac.in Guide: Dr. R. Kumar VIT University, Chennai -600048 kumar.rangasamy@vit.ac.in

More information

Determining the Number of CPUs for Query Processing

Determining the Number of CPUs for Query Processing Determining the Number of CPUs for Query Processing Fatemah Panahi Elizabeth Soechting CS747 Advanced Computer Systems Analysis Techniques The University of Wisconsin-Madison fatemeh@cs.wisc.edu, eas@cs.wisc.edu

More information

Linear Programming Based Affinity Scheduling for Heterogeneous Computing Systems

Linear Programming Based Affinity Scheduling for Heterogeneous Computing Systems Linear Programming Based Affinity Scheduling for Heterogeneous Computing Systems Issam Al-Azzoni Department of Computing and Software McMaster University Hamilton, Ontario, Canada Douglas G Down Department

More information

Joe Wingbermuehle, (A paper written under the guidance of Prof. Raj Jain)

Joe Wingbermuehle, (A paper written under the guidance of Prof. Raj Jain) 1 of 11 5/4/2011 4:49 PM Joe Wingbermuehle, wingbej@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The Auto-Pipe system allows one to evaluate various resource mappings and topologies

More information

Πποχωπημένη Κατανεμημένη Υπολογιστική

Πποχωπημένη Κατανεμημένη Υπολογιστική Πποχωπημένη Κατανεμημένη Υπολογιστική ΗΥ623 Διδάζκων Δημήηριος Καηζαρός @ Τμ. ΗΜΜΥ Πανεπιστήμιο Θεσσαλίαρ Διάλεξη 3η 1 Virtualization Concepts Definitions Virtualization A layer mapping its visible interface

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks

Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks 1648 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 5, OCTOBER 2015 Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks Dan Li, Member, IEEE, Jing Zhu, Jianping Wu, Fellow,

More information

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents E-Companion: On Styles in Product Design: An Analysis of US Design Patents 1 PART A: FORMALIZING THE DEFINITION OF STYLES A.1 Styles as categories of designs of similar form Our task involves categorizing

More information

Energy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms

Energy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms Energy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms Dawei Li and Jie Wu Department of Computer and Information Sciences Temple University Philadelphia, USA {dawei.li,

More information

Polynomial-Time Approximation Algorithms

Polynomial-Time Approximation Algorithms 6.854 Advanced Algorithms Lecture 20: 10/27/2006 Lecturer: David Karger Scribes: Matt Doherty, John Nham, Sergiy Sidenko, David Schultz Polynomial-Time Approximation Algorithms NP-hard problems are a vast

More information

Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures

Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures Alaa Amin and Reda Ammar Computer Science and Eng. Dept. University of Connecticut Ayman El Dessouly Electronics

More information

FuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc

FuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc Fuxi Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc {jiamang.wang, yongjun.wyj, hua.caihua, zhipeng.tzp, zhiqiang.lv,

More information

Two-Level Dynamic Load Balancing Algorithm Using Load Thresholds and Pairwise Immigration

Two-Level Dynamic Load Balancing Algorithm Using Load Thresholds and Pairwise Immigration Two-Level Dynamic Load Balancing Algorithm Using Load Thresholds and Pairwise Immigration Hojiev Sardor Qurbonboyevich Department of IT Convergence Engineering Kumoh National Institute of Technology, Daehak-ro

More information

BigDataBench-MT: Multi-tenancy version of BigDataBench

BigDataBench-MT: Multi-tenancy version of BigDataBench BigDataBench-MT: Multi-tenancy version of BigDataBench Gang Lu Beijing Academy of Frontier Science and Technology BigDataBench Tutorial, ASPLOS 2016 Atlanta, GA, USA n Software perspective Multi-tenancy

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer

More information

The alternator. Mohamed G. Gouda F. Furman Haddix

The alternator. Mohamed G. Gouda F. Furman Haddix Distrib. Comput. (2007) 20:21 28 DOI 10.1007/s00446-007-0033-1 The alternator Mohamed G. Gouda F. Furman Haddix Received: 28 August 1999 / Accepted: 5 July 2000 / Published online: 12 June 2007 Springer-Verlag

More information

Intelligent, real-time scheduling for FMS

Intelligent, real-time scheduling for FMS Intelligent, real-time scheduling for FMS V. Simeunovi}, S. Vrane{ Computer System Department, Institute Mihajlo Pupin, Volgina 15, 11060 Belgrade, Yugoslavia Email: vlada@lab200.imp.bg.ac.yu, sanja@lab200.imp.bg.ac.yu

More information

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m

More information

Joint Optimization of Server and Network Resource Utilization in Cloud Data Centers

Joint Optimization of Server and Network Resource Utilization in Cloud Data Centers Joint Optimization of Server and Network Resource Utilization in Cloud Data Centers Biyu Zhou, Jie Wu, Lin Wang, Fa Zhang, and Zhiyong Liu Beijing Key Laboratory of Mobile Computing and Pervasive Device,

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

Fast algorithms for max independent set

Fast algorithms for max independent set Fast algorithms for max independent set N. Bourgeois 1 B. Escoffier 1 V. Th. Paschos 1 J.M.M. van Rooij 2 1 LAMSADE, CNRS and Université Paris-Dauphine, France {bourgeois,escoffier,paschos}@lamsade.dauphine.fr

More information

Clustering based Max-Min Scheduling in Cloud Environment

Clustering based Max-Min Scheduling in Cloud Environment Clustering based Max- Scheduling in Cloud Environment Zonayed Ahmed Department of CSE Stamford University Bangladesh Dhaka, Bangladesh Adnan Ferdous Ashrafi Department of CSE Stamford University Bangladesh

More information

HPC in Cloud. Presenter: Naresh K. Sehgal Contributors: Billy Cox, John M. Acken, Sohum Sohoni

HPC in Cloud. Presenter: Naresh K. Sehgal Contributors: Billy Cox, John M. Acken, Sohum Sohoni HPC in Cloud Presenter: Naresh K. Sehgal Contributors: Billy Cox, John M. Acken, Sohum Sohoni 2 Agenda What is HPC? Problem Statement(s) Cloud Workload Characterization Translation from High Level Issues

More information

Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism

Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism Xiao Qin, Hong Jiang, Yifeng Zhu, David R. Swanson Department of Computer Science and Engineering

More information

Load Balancing in Distributed System through Task Migration

Load Balancing in Distributed System through Task Migration Load Balancing in Distributed System through Task Migration Santosh Kumar Maurya 1 Subharti Institute of Technology & Engineering Meerut India Email- santoshranu@yahoo.com Khaleel Ahmad 2 Assistant Professor

More information

Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center

Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center , pp.350-355 http://dx.doi.org/10.14257/astl.2013.29.74 Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center Hieu Trong Vu 1,2, Soonwook Hwang 1* 1 National

More information

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1 Contents: Introduction Multicast on parallel distributed systems Multicast on P2P systems Multicast on clouds High performance

More information

Star: Sla-Aware Autonomic Management of Cloud Resources

Star: Sla-Aware Autonomic Management of Cloud Resources Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

THE VMTURBO CLOUD CONTROL PLANE

THE VMTURBO CLOUD CONTROL PLANE THE VMTURBO CLOUD CONTROL PLANE Software-Driven Control for the Software-Defined Data Center EXECUTIVE SUMMARY The Software-Defined Datacenter (SDDC) has the potential to extend the agility, operational

More information

Private Cloud at IIT Delhi

Private Cloud at IIT Delhi Private Cloud at IIT Delhi Success Story Engagement: Long Term Industry: Education Offering: Private Cloud Deployment Business Challenge IIT Delhi, one of the India's leading educational Institute wanted

More information

Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid

Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid Journal of Computer Science Original Research Paper Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid 1 R. Vijayalakshmi and 2 V. Vasudevan 1 Department of Computer

More information

TPC-E testing of Microsoft SQL Server 2016 on Dell EMC PowerEdge R830 Server and Dell EMC SC9000 Storage

TPC-E testing of Microsoft SQL Server 2016 on Dell EMC PowerEdge R830 Server and Dell EMC SC9000 Storage TPC-E testing of Microsoft SQL Server 2016 on Dell EMC PowerEdge R830 Server and Dell EMC SC9000 Storage Performance Study of Microsoft SQL Server 2016 Dell Engineering February 2017 Table of contents

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols Preprint Incompatibility Dimensions and Integration of Atomic Protocols, Yousef J. Al-Houmaily, International Arab Journal of Information Technology, Vol. 5, No. 4, pp. 381-392, October 2008. Incompatibility

More information

Virtualization and the Metrics of Performance & Capacity Management

Virtualization and the Metrics of Performance & Capacity Management 23 S September t b 2011 Virtualization and the Metrics of Performance & Capacity Management Has the world changed? Mark Preston Agenda Reality Check. General Observations Traditional metrics for a non-virtual

More information

Approximation Algorithms for Wavelength Assignment

Approximation Algorithms for Wavelength Assignment Approximation Algorithms for Wavelength Assignment Vijay Kumar Atri Rudra Abstract Winkler and Zhang introduced the FIBER MINIMIZATION problem in [3]. They showed that the problem is NP-complete but left

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

Clustering. (Part 2)

Clustering. (Part 2) Clustering (Part 2) 1 k-means clustering 2 General Observations on k-means clustering In essence, k-means clustering aims at minimizing cluster variance. It is typically used in Euclidean spaces and works

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems

A Level-wise Priority Based Task Scheduling for Heterogeneous Systems International Journal of Information and Education Technology, Vol., No. 5, December A Level-wise Priority Based Task Scheduling for Heterogeneous Systems R. Eswari and S. Nickolas, Member IACSIT Abstract

More information

Applied Algorithm Design Lecture 3

Applied Algorithm Design Lecture 3 Applied Algorithm Design Lecture 3 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 3 1 / 75 PART I : GREEDY ALGORITHMS Pietro Michiardi (Eurecom) Applied Algorithm

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

Adaptive Cluster Computing using JavaSpaces

Adaptive Cluster Computing using JavaSpaces Adaptive Cluster Computing using JavaSpaces Jyoti Batheja and Manish Parashar The Applied Software Systems Lab. ECE Department, Rutgers University Outline Background Introduction Related Work Summary of

More information

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Walter Cerroni, Franco Callegati DEI University of Bologna, Italy Outline Motivations Virtualized edge networks

More information

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221

More information

Tasks Scheduling using Ant Colony Optimization

Tasks Scheduling using Ant Colony Optimization Journal of Computer Science 8 (8): 1314-1320, 2012 ISSN 1549-3636 2012 Science Publications Tasks Scheduling using Ant Colony Optimization 1 Umarani Srikanth G., 2 V. Uma Maheswari, 3.P. Shanthi and 4

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

Grid Scheduler. Grid Information Service. Local Resource Manager L l Resource Manager. Single CPU (Time Shared Allocation) (Space Shared Allocation)

Grid Scheduler. Grid Information Service. Local Resource Manager L l Resource Manager. Single CPU (Time Shared Allocation) (Space Shared Allocation) Scheduling on the Grid 1 2 Grid Scheduling Architecture User Application Grid Scheduler Grid Information Service Local Resource Manager Local Resource Manager Local L l Resource Manager 2100 2100 2100

More information

Multicast Scheduling in WDM Switching Networks

Multicast Scheduling in WDM Switching Networks Multicast Scheduling in WDM Switching Networks Zhenghao Zhang and Yuanyuan Yang Dept. of Electrical & Computer Engineering, State University of New York, Stony Brook, NY 11794, USA Abstract Optical WDM

More information

Enhancing Cloud Resource Utilisation using Statistical Analysis

Enhancing Cloud Resource Utilisation using Statistical Analysis Institute of Advanced Engineering and Science International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.3, No.1, February 2014, pp. 1~25 ISSN: 2089-3337 1 Enhancing Cloud Resource Utilisation

More information

Bio-Inspired Techniques for the Efficient Migration of Virtual Machine for Load Balancing In Cloud Computing

Bio-Inspired Techniques for the Efficient Migration of Virtual Machine for Load Balancing In Cloud Computing Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Bio-Inspired Techniques for the Efficient Migration of Virtual Machine for Load Balancing

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Modeling Service Applications for Optimal Parallel Embedding

Modeling Service Applications for Optimal Parallel Embedding Modeling Service Applications for Optimal Parallel Embedding Changcheng Huang Department of Systems and Computer Engineering Carleton University Ottawa, Canada huang@sce.carleton.ca Jiafeng Zhu Huawei

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,

More information

Venice: Reliable Virtual Data Center Embedding in Clouds

Venice: Reliable Virtual Data Center Embedding in Clouds Venice: Reliable Virtual Data Center Embedding in Clouds Qi Zhang, Mohamed Faten Zhani, Maissa Jabri and Raouf Boutaba University of Waterloo IEEE INFOCOM Toronto, Ontario, Canada April 29, 2014 1 Introduction

More information

Multi-tenancy version of BigDataBench

Multi-tenancy version of BigDataBench Multi-tenancy version of BigDataBench Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Multi-tenancy

More information

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have

More information

Interprocess Communication By: Kaushik Vaghani

Interprocess Communication By: Kaushik Vaghani Interprocess Communication By: Kaushik Vaghani Background Race Condition: A situation where several processes access and manipulate the same data concurrently and the outcome of execution depends on the

More information

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date:

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date: Subject Name: OPERATING SYSTEMS Subject Code: 10EC65 Prepared By: Kala H S and Remya R Department: ECE Date: Unit 7 SCHEDULING TOPICS TO BE COVERED Preliminaries Non-preemptive scheduling policies Preemptive

More information